Lecturer in Cybersecurity and Digital Forensics
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
To develop an academically robust and unique consumer insight tool.
Innovate KTP no. 009884
Chief Scientists Office
PThe impact of psychological trauma on physical and mental health is well known, although current models of care are failing to meet clients’ needs. A new model of care, supported and financed by the ...
Scottish Funding Council
This IIDI project, led by Alistair Lawson, relates to Flummix's use of magic as the vehicle to pioneer new learning experiences that are in line with the curriculum for excellence, relevant, have real...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
08 February 2017
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
Director of Sustainable Construction
Senior Research Fellow
Lecturer in Cybersecurity and Networks
Ukwandu, E., Buchanan, W. & Russell, G. (in press). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)ISBN Not Known
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Alsnousi, E., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (in press). A New Weight based Rotating Clustering Scheme for WSNs. In Proceedings of ISNCC-2017 WMCN
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Hart, E., Sim, K., Gardiner, B. & Kamimura, K. (in press). A Hybrid Method for Feature Construction and Selection to Improve Wind-Damage Prediction in the Forestry Sector. In Proceedings of GEcco 2017doi:10.1145/3071178.3071217. ISBN unknown
Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing r...
Rutter, M. J., Smith, S. & Binyamin, S. (2017). The students acceptance of learning management systems in Saudi Arabia: a case study of King Abdulaziz University. In INTED2017 Proceedings, 9324-9333. doi:10.21125/inted.2017.2205. ISBN 978-84-617-8491-2
The Technology Acceptance Model (TAM) has become one of the most widely-used models in understanding user acceptance of technologies and has been employed in many empirical st...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In Proceedings
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Romdhani, I., Djedjig, N., Medjek, F. & Tandjaoui, D. (in press). New Trust Metric for the RPL Routing Protocol. In Proceedings of ICICS 2017
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Buwert, P. (2017). Shepard Fairey’s inauguration posters may define political art in Trump era
The American street artist Shepard Fairey created a poster for Barack Obama’s presidential election campaign. It was 2008 and the simple red, beige and blue stencilled image o...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
Ghaleb, B., Al-Dubai, A., Ekonomou, E. & Paechter, B. (2016). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE, 1-6. doi:10.1109/WCNC.2016.7564654. ISBN 978-1-4673-9814-5
Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and L...
Weaver, M., Tan, H., Crossan, K. & Paxton, S. (2016). Taking Action to Unlock Business Resources Into Communities using SSM. In Proceedings of OR58, Annual Operations Research Conference
This session presents three system conceptual models that have been brought to action as a result of an SSM study with the Voluntary Action Fund (a Scottish grant-maker). VAF ...
Steyven, A., Hart, E. & Paechter, B. (2016). Understanding environmental influence in an open-ended evolutionary algorithm. In Parallel Problem Solving from Nature – PPSN XIV, 921-931. doi:10.1007/978-3-319-45823-6_86. ISBN 978-3-319-45822-9
It is well known that in open-ended evolution, the nature
of the environment plays in key role in directing evolution. However, in Evolutionary Robotics, it is often unclear e...
Taylor-Smith, E. & Smith, C. F. (2016). Non-public eParticipation in social media spaces. In SMSociety '16 Proceedings of the 7th 2016 International Conference on Social Media & Societydoi:10.1145/2930971.2930974
This paper focuses on the importance of non-public social media spaces in contemporary democratic participation at the grassroots level, based on case studies of citizen-led, ...
Society for Research into Higher Education
Teaching-focused academics in UK Life Science departments may experience anxiety about their continued ability to teach undergraduates at Honours level, and postgraduates at Masters and doctoral level...
Edinburgh & Lothians Health Foundation
Surviving critical illness is associated with chronic psychological distress. Anxiety occurs in 43% of patients and depression in 30% of patients at 12 months after hospital discharge. Post-traumatic ...
A digital dome is a large physical object that can fully immerse one or more users and present them digital material via rear projection onto the dome’s surface. Such a system presents unique and curr...
The DISTRO network brings together leading laboratories in Visual Computing and 3D Computer Graphics research across Europe with the aim of training a new generation of scientists, technologists, and ...
Carnegie Trust for the Universities of Scotland
The aim of this project is to carry out a comparative study of the adaptation of destination organisations to their policy and operating environment in Scotland and Denmark with the view of identifyin...
The project aims to reduce carbon emissions through research and application of integrated sustainable infrastructure in the existing built environment that could be replicated on existing and new bui...
This IIDI project, led by Alistair Lawson, relates to Digital Connextions' educational e-portfolio platform, and academic resources that will connect, inspire, educate and entertain young people, fami...
New ideas are on the way to make healthcare more accurate, more affordable and matching the needs of our changing societies. Demographic changes, progress in technology and in medicine offer options t...
Dept of Communities & Local Government
To provide the DCLG with robust data and evidence to support future policy development relating to sound insulation criteria for 'new build' in England.
Medical Research Council
The need for robustly evaluated social interventions - In Scotland, primary schools are encouraged to include programmes for promoting emotional and social development, in line with the Curriculum for...
The company are planning to launch a new division of their business called ‘Leith.TV’. This will be a video-on-demand hyper local news service which will have a focus on Leith centric news. They are a...
Within the North Sea Region, freight moves by sea, road, rail and barge. Of these transport modes, sea and barge are the most sustainable. The aim of the LO-PINOD project is to facilitate more freight...
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud e...
The research is concerned with the evolution and trajectory of knowledge networking (t...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...
The topic Addresses the development of novel secrity echanisms for mobile ad hoc networks, inspired by mechanisms apparent in the biological...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Real Time Travel Information (RTTI) systems deliver information to a wide range of travellers using different modes, with the aim of...
Despite a growing research base in support of higher order thinking process...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
This thesis considers the role of community media in contemporary media policy developments of Anglophone Sub-Saharan ...
Explaining the origin and the evolution of cooperation has been a major challenge i...
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
The concept of context-awareness is widely used in mobile and pervasive computing t...
"There is a paucity of knowledge relating to the effects of ENM on the male reproductive system. Thus, there is a clear requirement...
Energy is undoubtedly the driving force at the core of the development of any nation. There
is a direct relation between per capita income and energy consumption. The way this energy
is produced, supp...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...